A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. The approach has been employed to use Fuzzy C-Mean clustering (FCM) to find the robust image regions for hiding the type of skin texture features in mice. The steganography was implemented using Least Significant Bit (LSB) method.
The goal of this study was intend to study the effects of induced
thyrotoxicosis on the histological structure of submandibular gland.
Two groups of mature albino mice wen: used, the first group was injected (subcutaneous) daily with (0.2_0.4)ml norma] salinfor 11 days and used as control group, while the second group was injected daily wi th L_thyroxin (T4) 0.2mg /Kg (subcutaneous) for l l days.
At the end of the treatment , supmandibular glands were processed for light microscopic examination .
The result.s have shown the presence of degenertaive changes of major submandibular acini cells in anima
... Show MorePseudoephedrine (PSE) or (Sudafed) is one of the sympathomimetic group of drugs (ephedrine, PSE and amphetamines) which effects cardiovascular system, respiratory system, and gastrointestinal tract. However, only little researches had supported its effect on solid abdominal organs. This study aims to investigate the effects of different doses of Sudafed in the liver and kidney of albino mice. The current study included 18 albino mice grouped into 2 groups: control (3 mice), and acute group (15 mice). The acute group was further subdivided into 5 subgroups, each subgroup of 3mice wasgiven a lonely intaperitonial injection of 0.3ml of the following conc. (500mg/kg, 250mg/kg, 125mg/kg, 62.52mg/kg, and 31.24mg/kg) for 24hrs. After the m
... Show MoreThe present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col
... Show MorePlasma physics and digital image processing technique (DIPT) were utilized in this research to show the effect of the cold plasma (plasma needle) on blood cells. The second order statistical features were used to study this effect. Different samples were used to reach the aim of this paper; the patients have leukemia and their leukocytes number was abnormal. By studying the results of statistical features (mean, variance, energy and entropy), it is concluded that the blood cells of the sample showed a good response to the cold plasma.
The process of evaluating business processes, complex, repetition of procurement processes, need for raw materials and frequency of demand, which makes dealing with suppliers in the evaluation process, making the need for a process intervention in the process. Lighter on the other hand.
Many Iraqi companies suffer from problems related to suppliers, and cases of administrative and financial corruption are often raised regarding this type of contract and from this reality the necessity of researching this problem and trying to develop some solutions to reduce its impact on the companies' work, by using a method that works according to the standards adopted in Evaluation and selection of the supplier in the
... Show MoreIn regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement
... Show MoreIn this paper, Min-Max composition fuzzy relation equation are studied. This study is a generalization of the works of Ohsato and Sekigushi. The conditions for the existence of solutions are studied, then the resolution of equations is discussed.